GIAC GSSP-.NET - GIAC GIAC Secure Software Programmer - C#.NET
Sam works as a Software Developer for GenTech Inc. He deploys an ASP.NET application on a server. When an error occurs, users are redirected to a custom error page that is specified in the Web.config file. Users report that a particular page repeatedly generates errors. Sam wants to gather detailed information about the error on this page. He also wants to ensure that users continue to be redirected to the custom error page, if the requested pages generate errors. What will Sam do to accomplish this?
You work as a Web Application Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You are creating an ASP.NET Web application using the .NET Framework. The application will allow users to post and reply to messages after logging. You create the authentication mechanisms for the application. You use SQL Server 2005 and the Active Directory service interchangeably for authentication. You are required to provide a method for users of the application to register. You also want to ensure that the application utilizes multiple authentication methods when users register. What will you do?
Which of the following code snippets is an example of tight encapsulation?
You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You are creating an ASP.NET Web application using .NET Framework 3.5. The application will be accessed by Internet users. You need to enable users to authenticate from the client-side script. You add the following code fragment in the Web.config file of the application:
You must configure the application to ensure that user credentials are validated against Active Directory by using the client-side script. What will you do to accomplish this?
Each correct answer represents a part of the solution. Choose two.
Maria works as a Software Developer for ManSoft Inc. She develops an application using Visual Studio .NET 2005. Maria wants to ensure that only employees of the Accounts department can view the application. Therefore, she decides to change the configuration settings in the Web.config file.
What will Maria do to accomplish the task?
You work as a Windows Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create a Windows application using .NET Framework 3.5. The application uses a SQL Server 2008 database on the network.
You use ADO.NET Data Services that exposes data as resources that are addressable by URIs. You access and change data by using the semantics of representational state transfer (REST), specifically the standard HTTP verbs of GET, PUT, POST, and DELETE. You must ensure that when a service violates any other constraint, the service cannot strictly be referred to as RESTful. What will you do?
You work as a Software Developer for ManSoft Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You create an application that will be used by all the branches of the company. You use the Regex class in the application to validate some strings. You want to search an input string for an occurrence of a regular expression. Which of the following methods of the Regex class will you use to accomplish the task?
You work as a Web Application Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create a Web application using .NET Framework 2.0. The application code restricts access to some pages based on the users' credentials. However, you are required to configure IIS to supply the user's Windows credentials to the Web application. All these credentials must be encrypted. What will you do?
You work as an Application Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You are creating an application that will match the location in a given string. You need to ensure that the match must begin at either the first character of the given string or the last character of a line in the string. Which of the following characters will you use to accomplish the task?
You work as an Enterprise Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create a logging utility class using .NET Framework 3.5. The utility class writes logs to event log services. You are required to ensure that the client applications that use the utility class can create an instance of the utility class only if they have access rights to write to the event log services.
What will you do?
